CN112887945A - Penetration testing method for Internet of vehicles network - Google Patents

Penetration testing method for Internet of vehicles network Download PDF

Info

Publication number
CN112887945A
CN112887945A CN202110031794.8A CN202110031794A CN112887945A CN 112887945 A CN112887945 A CN 112887945A CN 202110031794 A CN202110031794 A CN 202110031794A CN 112887945 A CN112887945 A CN 112887945A
Authority
CN
China
Prior art keywords
vehicle
test
app
code
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110031794.8A
Other languages
Chinese (zh)
Other versions
CN112887945B (en
Inventor
郭运尧
杨培相
王玉丹
苗维超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Third Research Institute of the Ministry of Public Security
Original Assignee
Third Research Institute of the Ministry of Public Security
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Third Research Institute of the Ministry of Public Security filed Critical Third Research Institute of the Ministry of Public Security
Priority to CN202110031794.8A priority Critical patent/CN112887945B/en
Publication of CN112887945A publication Critical patent/CN112887945A/en
Application granted granted Critical
Publication of CN112887945B publication Critical patent/CN112887945B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a penetration test method of an Internet of vehicles network, which comprises a safe SDK, an APP terminal and a vehicle terminal, and the penetration test method of the Internet of vehicles network comprises the following steps: step one, identity authentication: the user uses the logged mobile terminal equipment and the logged vehicle terminal displacement identification code to match with vehicle operation for pairing through first binding, the safety SDK completes generation of the unique identification code, and the vehicle operation completes confirmation of the relationship between a person and a vehicle; and the mobile terminal equipment exchanges the unique user identification code with the vehicle-terminal safety environment. The penetration test method of the car networking network has the advantages of being comprehensive in test and capable of carrying out detailed detection on possible faults in the car networking network in the actual use process.

Description

Penetration testing method for Internet of vehicles network
Technical Field
The invention relates to the technical field of Internet of vehicles, in particular to a penetration testing method of an Internet of vehicles network.
Background
The connotation of the Internet of vehicles mainly refers to: the vehicle-mounted equipment on the vehicle effectively utilizes all vehicle dynamic information in the information network platform through a wireless communication technology, provides different functional services in the running process of the vehicle, and can find that the internet of vehicles shows the following characteristics: the Internet of vehicles can provide guarantee for the distance between the vehicles, and the probability of collision accidents of the vehicles is reduced; the Internet of vehicles can help the vehicle owner to navigate in real time, and the efficiency of traffic operation is improved through communication with other vehicles and a network system.
Whether the car networking network is safe and reliable to be related to the driving safety and comfort level of a car owner, in case the car networking network breaks down, very easily cause the navigation of the car owner to break down unable normal operating, and can't cooperate the operation between each sensor and the communication centre, lead to the unable timely transmission of vehicle and road conditions information, for example the interval between car and the car just can't be transmitted, the probability that the vehicle collided just can great promotion, the driving safety of the car owner receives huge influence, the efficiency of traffic operation has been reduced, in order to solve the above-mentioned problem, a penetration test method of car networking network, need to be developed urgently.
Disclosure of Invention
The invention aims to provide a penetration test method of an Internet of vehicles network, which has the advantage of comprehensive test, and solves the problems that whether the Internet of vehicles network is safe and reliable relates to the driving safety and the comfort level of a vehicle owner, once the Internet of vehicles network breaks down, the navigation of the vehicle owner fails to operate normally, and each sensor and a communication center cannot operate cooperatively, so that the vehicle and road condition information cannot be transmitted in time, for example, the distance between the vehicles cannot be transmitted, the probability of vehicle collision is greatly improved, the driving safety of the vehicle owner is greatly influenced, and the efficiency of traffic operation is reduced.
In order to achieve the purpose, the invention provides the following technical scheme: the penetration testing method of the Internet of vehicles comprises the following steps:
step one, identity authentication: the user uses the logged mobile terminal equipment and the logged vehicle terminal displacement identification code to match with vehicle operation for pairing through first binding, the safety SDK completes generation of the unique identification code, and the vehicle operation completes confirmation of the relationship between a person and a vehicle; and the mobile terminal equipment exchanges the unique user identification code with the vehicle-terminal safety environment.
Step two, vehicle end communication safety test: detect it when car end and removal end carry out the bluetooth and connect, the detection mode includes following step:
the method comprises the steps of firstly, traversing BLE Bluetooth service and traversing all SSID information;
secondly, BLE Bluetooth forced connection attack, violently trying to establish illegal forced connection with a vehicle end, and testing the illegal connection rejection capability;
thirdly, detecting BLEC, and detecting the BLE known CVE loophole;
fourthly, performing BLE message fuzz test, and trying to construct a legal message fuzz test;
and fifthly, performing BLE replay detection, capturing a BLE vehicle control data packet, and checking the message safety through replay test.
Step three, APP code analysis and test: the method for analyzing the code of the APP of the user mobile terminal comprises the following steps:
firstly, code obfuscation, obfuscating JAVA code and NATIVE code by using an obfuscation tool;
secondly, protecting the APP code, namely attempting to perform shelling treatment on the reinforced and protected APP code to obtain a source code;
thirdly, analyzing the APP Bluetooth encryption algorithm, and analyzing the APP end data communication encryption algorithm;
finding out APP code logic defects, finding out logic defects related to Bluetooth authentication and testing a communication process;
and fifthly, the APP Bluetooth connection algorithm is reproduced, the Bluetooth encryption flow is analyzed, the connection algorithm is tried to be rewritten, and vehicle control is achieved or partially achieved.
And step four, SO logic test, analysis of the SO file authentication process of the BLE service vehicle end, reversing SO codes and searching the authentication process.
Preferably, the penetration testing method of the internet of vehicles network further comprises a testing method of a vehicle end system:
firstly, a system ROOT test: the ROOT is performed by using a USB test interface ROOT to attack ROOT or using an APP ROOT.
Secondly, testing the safety of system firmware: the test method for the system firmware security test comprises the following steps:
1. firmware is tested by flashing;
2. reverse analysis of firmware;
3. and (5) firmware rollback flash testing.
Thirdly, carrying out an upgrade package cracking test: and trying to crack the local USB upgrade package.
Fourthly, testing system vulnerabilities: the method comprises the steps of trying unsafe service tests, trying redundant service tests, and trying security vulnerability tests with known system versions.
Fifthly, system upgrading safety test: and verifying the validity and integrity of the system upgrade package, and carrying out fault tolerance test.
Sixthly, testing the safety of the application software: whether the application software adopts confusion or not is detected, the encryption means is prevented from being decompiled, and whether redundant authority exists in the application software or not is detected.
Preferably, in the second vehicle-end communication safety test, all end-to-end communications adopt an HTTPS communication mode.
Preferably, in the second vehicle-end communication security test, a Certificate screening or bidirectional authentication mechanism is adopted to place MRRY attacks.
Preferably, the vehicle-end information storage comprises two encryption modes of white-box encryption and hardware encryption.
Compared with the prior art, the invention has the following beneficial effects:
the invention detects the possible faults of the Internet of vehicles by carrying out detailed and comprehensive tests on the safe SDK, the APP end and the vehicle end, and modifies the test result to ensure the stability and the reliability of the Internet of vehicles network, the penetration test method of the Internet of vehicles network has the advantage of comprehensive test, can carry out detailed detection on the possible faults in the Internet of vehicles network in the actual use process, solves the problem that whether the Internet of vehicles network is safe and reliable relates to the driving safety and the comfort level of a vehicle owner, once the Internet of vehicles network has faults, the navigation of the vehicle owner has faults and can not normally run, and the sensors and the communication center can not cooperate with each other, so that the vehicle and road condition information can not be transmitted in time, for example, the distance between the vehicles can not be transmitted, the probability of vehicle collision can be greatly improved, and the driving safety of the vehicle owner is greatly influenced, the efficiency of traffic operation is reduced.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a technical scheme that: the penetration testing method of the Internet of vehicles comprises the following steps:
step one, identity authentication: the user uses the logged mobile terminal equipment and the logged vehicle terminal displacement identification code to match with vehicle operation for pairing through first binding, the safety SDK completes generation of the unique identification code, and the vehicle operation completes confirmation of the relationship between a person and a vehicle; the mobile terminal equipment exchanges the unique user identification code with the vehicle terminal safety environment, and the safety SDK initializes and authorizes the vehicle to safely establish connection mainly aiming at the safety test of the environment where the mobile phone and the vehicle safety SDK are located.
Step two, vehicle end communication safety test: detect it when car end and removal end carry out the bluetooth and connect, the detection mode includes following step:
the method comprises the steps of firstly, traversing BLE Bluetooth service and traversing all SSID information;
secondly, BLE Bluetooth forced connection attack, violently trying to establish illegal forced connection with a vehicle end, and testing the illegal connection rejection capability;
thirdly, detecting BLEC, and detecting the BLE known CVE loophole;
fourthly, performing BLE message fuzz test, and trying to construct a legal message fuzz test;
and fifthly, performing BLE replay detection, capturing a BLE vehicle control data packet, and checking the message safety through replay test.
Step three, APP code analysis and test: the method for analyzing the code of the APP of the user mobile terminal comprises the following steps:
firstly, code obfuscation, obfuscating JAVA code and NATIVE code by using an obfuscation tool;
secondly, protecting the APP code, namely attempting to perform shelling treatment on the reinforced and protected APP code to obtain a source code;
thirdly, analyzing the APP Bluetooth encryption algorithm, and analyzing the APP end data communication encryption algorithm;
finding out APP code logic defects, finding out logic defects related to Bluetooth authentication and testing a communication process;
and fifthly, the APP Bluetooth connection algorithm is reproduced, the Bluetooth encryption flow is analyzed, the connection algorithm is tried to be rewritten, and vehicle control is achieved or partially achieved.
And step four, SO logic test, analysis of the SO file authentication process of the BLE service vehicle end, reversing SO codes and searching the authentication process.
In the invention: the penetration test method of the Internet of vehicles network also comprises a test method of the vehicle end system:
firstly, a system ROOT test: using a USB test interface ROOT to attack ROOT or using an APP ROOT mode to carry out ROOT;
secondly, testing the safety of system firmware: the test method for the system firmware security test comprises the following steps:
1. firmware is tested by flashing;
2. reverse analysis of firmware;
3. and (5) firmware rollback flash testing.
Thirdly, carrying out an upgrade package cracking test: trying to crack a local USB upgrade package;
fourthly, testing system vulnerabilities: the method comprises the steps of trying unsafe service tests, trying redundant service tests, and trying security vulnerability tests with known system versions.
Fifthly, system upgrading safety test: the validity and the integrity of the system upgrade package are verified, the fault tolerance test is carried out, the terminal needs to verify the validity of the upgrade package through a signature, and in the fault tolerance test, a complete mechanism is needed to ensure that the upgrade package can be effectively rolled back when the upgrade package cannot be normally used.
Sixthly, testing the safety of the application software: whether the application software adopts confusion or not is detected, the encryption means is prevented from being decompiled, and whether redundant authority exists in the application software or not is detected.
In the invention: and in the second vehicle end communication safety test, all end-to-end communication adopts an HTTPS communication mode, and all communication contents with the background and the vehicle end are ensured to be encrypted and transmitted.
In the invention: in the second vehicle-end communication safety test, a Certificate screening or bidirectional authentication mechanism is adopted to place MRRY attacks, so that the encryption is ensured, and meanwhile, man-in-the-middle attacks can be prevented.
In the invention: the vehicle-end information storage comprises two encryption modes of white-box encryption and hardware encryption, wherein the hardware encryption is an encryption mode of software plus hardware level.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (5)

1. The utility model provides a penetration test method of car networking, includes safe SDK, APP end and car end, its characterized in that: the penetration testing method of the Internet of vehicles network comprises the following steps:
step one, identity authentication: the user uses the logged mobile terminal equipment and the logged vehicle terminal displacement identification code to match with vehicle operation for pairing through first binding, the safety SDK completes generation of the unique identification code, and the vehicle operation completes confirmation of the relationship between a person and a vehicle; the mobile terminal equipment exchanges the unique user identification code with the vehicle-terminal safety environment;
step two, vehicle end communication safety test: detect it when car end and removal end carry out the bluetooth and connect, the detection mode includes following step:
the method comprises the steps of firstly, traversing BLE Bluetooth service and traversing all SSID information;
secondly, BLE Bluetooth forced connection attack, violently trying to establish illegal forced connection with a vehicle end, and testing the illegal connection rejection capability;
thirdly, detecting BLEC, and detecting the BLE known CVE loophole;
fourthly, performing BLE message fuzz test, and trying to construct a legal message fuzz test;
fifthly, performing BLE replay detection, capturing a BLE vehicle control data packet, and checking message safety through replay test;
step three, APP code analysis and test: the method for analyzing the code of the APP of the user mobile terminal comprises the following steps:
firstly, code obfuscation, obfuscating JAVA code and NATIVE code by using an obfuscation tool;
secondly, protecting the APP code, namely attempting to perform shelling treatment on the reinforced and protected APP code to obtain a source code;
thirdly, analyzing the APP Bluetooth encryption algorithm, and analyzing the APP end data communication encryption algorithm;
finding out APP code logic defects, finding out logic defects related to Bluetooth authentication and testing a communication process;
fifthly, reappearing the APP Bluetooth connection algorithm, analyzing the Bluetooth encryption flow, trying to rewrite the connection algorithm, and realizing or partially realizing vehicle control;
and step four, SO logic test, analysis of the SO file authentication process of the BLE service vehicle end, reversing SO codes and searching the authentication process.
2. The penetration testing method of the internet of vehicles network according to claim 1, characterized in that: the method also comprises a test method of the vehicle end system:
firstly, a system ROOT test: using a USB test interface ROOT to attack ROOT or using an APP ROOT mode to carry out ROOT;
secondly, testing the safety of system firmware: the test method for the system firmware security test comprises the following steps:
1. firmware is tested by flashing;
2. reverse analysis of firmware;
3. firmware rollback flash test;
thirdly, carrying out an upgrade package cracking test: trying to crack a local USB upgrade package;
fourthly, testing system vulnerabilities: the method comprises the following steps of trying unsafe service tests, trying redundant service tests, and trying security vulnerability tests with known system versions;
fifthly, system upgrading safety test: verifying the validity and integrity of the system upgrade package, and performing fault tolerance test;
sixthly, testing the safety of the application software: whether the application software adopts confusion or not is detected, the encryption means is prevented from being decompiled, and whether redundant authority exists in the application software or not is detected.
3. The penetration testing method of the internet of vehicles network according to claim 1, characterized in that: in the second vehicle-end communication safety test, all end-to-end communication adopts an HTTPS communication mode.
4. The penetration testing method of the internet of vehicles network according to claim 1, characterized in that: in the second vehicle end communication safety test, a Certificate screening or bidirectional authentication mechanism is adopted to place MRRY attacks.
5. The penetration testing method of the internet of vehicles network according to claim 1, characterized in that: the vehicle-end information storage comprises two encryption modes of white-box encryption and hardware encryption.
CN202110031794.8A 2021-01-11 2021-01-11 Penetration testing method for Internet of vehicles network Active CN112887945B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110031794.8A CN112887945B (en) 2021-01-11 2021-01-11 Penetration testing method for Internet of vehicles network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110031794.8A CN112887945B (en) 2021-01-11 2021-01-11 Penetration testing method for Internet of vehicles network

Publications (2)

Publication Number Publication Date
CN112887945A true CN112887945A (en) 2021-06-01
CN112887945B CN112887945B (en) 2022-12-09

Family

ID=76044065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110031794.8A Active CN112887945B (en) 2021-01-11 2021-01-11 Penetration testing method for Internet of vehicles network

Country Status (1)

Country Link
CN (1) CN112887945B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116502238A (en) * 2023-06-26 2023-07-28 中汽智联技术有限公司 Protection method based on car networking product security vulnerability professional library CAVD

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102541729A (en) * 2010-12-31 2012-07-04 航空工业信息中心 Detection device and method for security vulnerability of software
US20140089202A1 (en) * 2012-09-27 2014-03-27 Michael K. Bond CRM Security Core
CN104410569A (en) * 2014-11-26 2015-03-11 公安部第三研究所 Perception communication interconnecting gateway and method for processing data
CN104484607A (en) * 2014-12-16 2015-04-01 上海交通大学 Universal method and universal system for performing safety testing on Android application programs
US20160379486A1 (en) * 2015-03-24 2016-12-29 Donald Warren Taylor Apparatus and system to manage monitored vehicular flow rate
KR101781135B1 (en) * 2017-03-28 2017-09-22 자동차부품연구원 Apparatus for estimating and monitoring communication security of vehicle-network
CN107241716A (en) * 2017-06-01 2017-10-10 国家计算机网络与信息安全管理中心 The network service detection means and detection method of car networking
CN107392033A (en) * 2017-08-30 2017-11-24 杭州安恒信息技术有限公司 A kind of Android device Permeation Test System and its automation penetration testing method
WO2018103252A1 (en) * 2016-12-05 2018-06-14 深圳市元征科技股份有限公司 Secondary development method and apparatus for diagnostic device
US20180205754A1 (en) * 2017-01-17 2018-07-19 NextEv USA, Inc. Real-time network vulnerability analysis and patching
CN108430069A (en) * 2018-02-11 2018-08-21 重庆邮电大学 A kind of V2X applied in network performance test and comprehensive evaluation analysis method
CN109145579A (en) * 2018-08-18 2019-01-04 北京航空航天大学 Intelligent network joins automobile information secure authentication testing method and system
CN110162977A (en) * 2019-04-24 2019-08-23 北京邮电大学 A kind of Android vehicle-mounted terminal system leakage location and method
CN111901349A (en) * 2020-07-29 2020-11-06 北京天融信网络安全技术有限公司 Penetration testing method, device and system based on in-vehicle CAN bus

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102541729A (en) * 2010-12-31 2012-07-04 航空工业信息中心 Detection device and method for security vulnerability of software
US20140089202A1 (en) * 2012-09-27 2014-03-27 Michael K. Bond CRM Security Core
CN104410569A (en) * 2014-11-26 2015-03-11 公安部第三研究所 Perception communication interconnecting gateway and method for processing data
CN104484607A (en) * 2014-12-16 2015-04-01 上海交通大学 Universal method and universal system for performing safety testing on Android application programs
US20160379486A1 (en) * 2015-03-24 2016-12-29 Donald Warren Taylor Apparatus and system to manage monitored vehicular flow rate
WO2018103252A1 (en) * 2016-12-05 2018-06-14 深圳市元征科技股份有限公司 Secondary development method and apparatus for diagnostic device
US20180205754A1 (en) * 2017-01-17 2018-07-19 NextEv USA, Inc. Real-time network vulnerability analysis and patching
KR101781135B1 (en) * 2017-03-28 2017-09-22 자동차부품연구원 Apparatus for estimating and monitoring communication security of vehicle-network
CN107241716A (en) * 2017-06-01 2017-10-10 国家计算机网络与信息安全管理中心 The network service detection means and detection method of car networking
CN107392033A (en) * 2017-08-30 2017-11-24 杭州安恒信息技术有限公司 A kind of Android device Permeation Test System and its automation penetration testing method
CN108430069A (en) * 2018-02-11 2018-08-21 重庆邮电大学 A kind of V2X applied in network performance test and comprehensive evaluation analysis method
CN109145579A (en) * 2018-08-18 2019-01-04 北京航空航天大学 Intelligent network joins automobile information secure authentication testing method and system
CN110162977A (en) * 2019-04-24 2019-08-23 北京邮电大学 A kind of Android vehicle-mounted terminal system leakage location and method
CN111901349A (en) * 2020-07-29 2020-11-06 北京天融信网络安全技术有限公司 Penetration testing method, device and system based on in-vehicle CAN bus

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
XUEBIN SHAO: "Research on Detection and Evaluation Technology of Cybersecurity in Intelligent and Connected Vehicle", 《2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND ADVANCED MANUFACTURING (AIAM)》 *
周媛媛: "车联网信息安全测试技术分析及应用", 《北京汽车》 *
李岩松: "复杂网络环境下智能网联汽车安全威胁分析与远程入侵研究", 《工程科技Ⅱ辑》 *
李霞等: "基于渗透测试的车联网通信安全与防范措施", 《现代制造技术与装备》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116502238A (en) * 2023-06-26 2023-07-28 中汽智联技术有限公司 Protection method based on car networking product security vulnerability professional library CAVD
CN116502238B (en) * 2023-06-26 2023-10-10 中汽智联技术有限公司 Protection method based on car networking product security vulnerability professional library CAVD

Also Published As

Publication number Publication date
CN112887945B (en) 2022-12-09

Similar Documents

Publication Publication Date Title
CN104468582B (en) Authentication and authorization method and system for user information
CN101199183B (en) Method, device and system enabling the component of a motor vehicle to reliably communicate with an external communication partner by means of a wireless communications connection
CN102131182B (en) Network locking method and device for mobile terminal
CN111422163B (en) Vehicle ignition method and system based on face recognition and vehicle
CN105119901B (en) A kind of detection method and system of fishing hot spot
US20220337616A1 (en) Method and System for Providing Security on in-Vehicle Network
CN108923933A (en) The working method of server, the upgrade method of car-mounted terminal and system
KR20140022975A (en) Apparatus and method for controlling traffic based on captcha
CN111901782A (en) Method, computing device, and medium for managing vehicles
CN101909279A (en) Authentication method for mobile phone video monitoring
CN112887945B (en) Penetration testing method for Internet of vehicles network
CN103686651A (en) Emergency call based authentication method, device and system
CN106897606A (en) A kind of brush machine means of defence and device
CN106897627B (en) Method for ensuring automobile ECU to be free from attack and automatically updated
CN107122664B (en) Safety protection method and device
CN111314921A (en) Test system, method, device and storage medium based on wireless communication
CN103763759A (en) Short-message-based method and system for activating LTE function
CN111107546A (en) Target object verification method and system, storage medium and electronic device
CN115829572A (en) Cross-chain data interaction method, device, equipment, medium and product
Chen et al. Classified security protection evaluation for vehicle information system
CN110830465B (en) Security protection method for accessing UKey, server and client
CN114338073A (en) Protection method, system, storage medium and equipment for vehicle-mounted network
Ma et al. Research on cyber security risk of telematics box in intelligent connected vehicle
EP4057583A1 (en) System for the inspection, evaluation and diagnosis of the level of cybersecurity of a vehicle
Zachos et al. Test method for the sae j3138 automotive cyber security standard

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant